TestOut PC Pro A+ 220-801 / 220-802 | Networking

Which of the following are advantages of using fiber optic cabling for a network, as opposed to other types of cabling? (select two)

1) Immunity to electromagnetic interference

2) Greater cable distances without a repeater

You have been asked to implement a network infrastructure that will accommodate failed connections. Which of the following network typologies provide redundancy for a failed link?

Mesh

Which of the following network technologies is packaged as part of a BRI plan?

ISDN

Which mechanisms could you use to resolve a hostname into its associated IP address? (select two)

1) DNS

2) hosts file

A healthcare organization provides mobile clinics throughout the world and needs to transfer patient statistical data to a central database via the Internet. Which network technology should you select to ensure network connectivity for any clinic located anywhere in the world, even remote areas?

Satellite

Which of the following is true of a network using the 1000Base-T standard? (select two)

1) The network uses copper UTP cables

2) The network operates at one gigabit per second

Which of the following describes an IPv6 address? (select two)

1) 128-bit address

2) Eight hexadecimal quartets

Which of the following is not one of the ranges of IP addresses defines in RFC 1918 that are commonly used behind a NAT server?

169.254.0.1 – 169.254.255.254

You want to implement a fault tolerant topology as you interconnect routers on your wide area network. Which of the following would meet your needs?

Mesh

You are using a crimper to attach an RJ-45 connector to a Cat 6 UTP cable. You need to use the T568A standard to connect the individual wires to the connector. Which wire should be connected to pin 1?

Green with white

Which of the following are not valid IP addresses? (select three)

1) 145.8.260.7

2) 257.0.122.55

3) 45.22.156.256

When configuring an ADSL installation, where should you to install the DSL filters?

On connections leading to an analog phone

Which of the following measures will make your wireless network less visible to the casual attacker performing war driving?

Disable SSID broadcast

Which of the following are used to connect a cable modem to the Internet connection? (select two)

1) RG-6 coaxial cable

2) F-type connectors

Which of the following terms refers to a network resource sharing model that uses access to control lists saved on each computer? (select two)

1) Peer-to-peer

2) Workgroup

Which of the following protocols is used by an e-mail client to retrieve messages from an e-mail server and gives users the option to keep mail messages on the server?

IMAP

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While she normally works from her office, today she is trying to access the wireless network from a conference room which is across the hall and next to the elevator. What is the most likely cause of her connectivity problem?

Interference is affecting the wireless signal

Which connector is used with unshielded twisted pair (UTP) cable?

RJ-45

Which of the following protocols is non-routable and requires another protocol to enable internetwork communications?

NetBOIS

In which of the following topologies does each device on the network act as a repeater, sending the signals to the next device?

Ring

You’ve just finished installing a wireless access point from a client. Which action best protects the access point from unauthorized configuration settings?

Changing the administrative password

How do switches and bridges learn where devices are located on a network?

When a frame enters a port, the source MAC address is copied from the frame header

You want to allow your users to download files from a server running the IP protocol. You want to protect access to the files by requiring user authentication to access specific directories on the server. Which IP protocol should you implement to provide this capability?

FTP

Which data transmission rate is defined by the IEEE 802.11b wireless standard?

11 Mbps

You have just signed up for a broadband home Internet service that uses coaxial cable. Which connector type will you most likely use?

F-type

Which type of connector do you use to connect a modem to a standard telephone line?

RJ-11

You need to attach an RJ-45 connector to the end of a Cat 6 UTP cable. Which tool should you use?

Crimper

You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?

WPA2

Which of the following topologies connects all devices to a trunk cable?

You need to place a wireless access point in your two-story building? While trying to avoid interference, which of the following is the best location for the access point?

In the top floor

Which of the following features on a wireless network allows or rejects client connections based on the hardware address?

MAC address filtering

You need to trace the route a Cat 6 UTP cable takes through the ceiling and walls of your building. Which tool should you use?

Tone probe

Which of the following IP addresses are Class B addresses? (select three)

1) 192.0.0.0

2) 190.65.2.0

3) 132.12.0.0

Which of the following are characteristics of the 802.11g wireless standard? (select three)

1) Operates in the 2.4 GHz range

2) Maximum bandwidth of 54 Mbps

3) Backwards compatible with 802.11b devices

You have a computer that is connected to the Internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer? (select three)

1) 192.168.12.253

2) 192.18.188.67

3) 10.0.12.15

Which of the following IP address ranges is reserved for Automatic Private IP Addressing?

169.254.0.2 – 169.254.255.254

Which of the following applications is more likely to justify the investment in Category 6 cable?

Streaming video

You have a network that uses a logical bus topology. How do messages travel through the network?

Messages are broadcast to all devices connected to the network

On a wireless network that is employing WEP, which type of users are allowed to authenticate through the access points?

Users with the correct WEP key

You are installing a satellite connection so your home office can connect to the Internet. Which of the following statement is true?

The satellite dish must be pointed in the correct direction for communicating with the satellite

Which of the following best describes an IP address class?

The class defines the default network address portion of the IP address

You have a network that uses a logical ring topology. How do messages travel through the network?

Messages travel from one device to the next until they reached the destination device

Which of the following is true of a network using the 10Base-T standard? (select two)

1) The maximum cable distance is 100 meters

2) The network operates at ten megabits per second

Which kind of connector do you use to connect a modem to a standard telephone line?

RJ-11

Which type of network medium is used by an Integrated Services Digital Network (ISDN) adapter?

Copper telephone wire

Which of the following is a rating of the amount of data that can be sent over a network in a period of time?

Bandwidth

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the break room two floors above the floor where she normally works. What is the most likely cause of her connectivity problem?

The user is out of the effective range of the wireless access point on her floor

Which IP protocol is used by Web browsers and Web servers to exchange files?

HTTP

A host wants to send a message to another host with the IP address 115.99.80.157. IP does not know the hardware address of the destination device. Which protocol can be used to discover the MAC address?

ARP

You’ve just installed a wireless access point (AP) for your organization’s network. You know that the radio signals used by the AP extend beyond your organization’s building and are concerned that unauthorized users outside may be able to access your internal network. What can you do to protect the wireless network? (select two)

1) Configure the AP to filter out unauthorized MAC addresses

2) Disable DHCP on the AP

Which of the following are characteristics of coaxial network cable? (select two)

1) It uses two concentric metallic conductors

2) It has a conductor made from copper in the center of the cable

Which of the following terms describes a group of computers and users that utilize centralized resources, administration, and security settings? (select two)

1) Domain

2) Directory

Which protocols are used on the Internet to transmit Web pages from Web browsers running on client workstations? (select two)

1) HTTP

2) HTTPS

Which connector is used with unshielded twisted pair (UTP) cable?

RJ-45

Which of the following are valid IPv6 addresses? (select two)

1) 141:0:0:0:15:0:0:1

2) 6384:1319:7700:7631:446A:5511:8940:2552

Which of the following protocols carry phone calls over an IP-based network?

VoIP

What type of cabling can be used for an Ethernet 100Base-T (100 Mbps) network? (select two)

1) Cat 6 UTP

2) Cat 5 UTP

You are configuring an ADSL connection. Which of the following will be part of the configuration? (select two)

1) Filters of splitters

2) RJ-11 connectors

You’ve enabled Remote Desktop on a Windows workstation. Which port must be opened in the server’s firewall to allow remote clients to access the desktop?

3389

Which network component connects a device to the transmission media and allows it to send and receive messages?

Network interface card

You have just signed up for a broadband home Internet services that uses coaxial cable. Which connector type will you most likely use?

F-type

You have implemented an ad-hoc wireless network that doesn’t employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical network topology has been implemented in this type of network?

Mesh

You have an Ethernet network using the 10Base-T standard. Network devices are connected together using hubs. Which of the following is true?

The network uses half-duplex communications

An 8-port switch receives a frame on port number 1. The frame is addressed to an unknown device. What will the switch do?

Send the frame out ports 2-8

Which of the following locations will contribute the greatest amount of interference for a wireless access point? (select two)

1) Near backup generators

2) Near cordless phones

What is the least secure place to locate the access point when creating a wireless network?

Near a window

Which of the following topologies connects each network device to a central hub?

Star

You’ve just installed the DNS service on a Windows server. Which port must be opened in the server’s firewall to allow clients to access the service?

53

Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network?

Ethernet

Which tool in Windows would you use to browse all networks and shared folders to which a user has access? (select three)

1) Network

2) Computer

3) Windows Explorer

Which service can you use on your network to automatically assign IP addresses to hosts and to help prevent the same address from being assigned to two different hosts?

DHCP

Which wireless standard operates at up to 54 Mbps to a maximum of 150 feet?

802.11a

Which of the following is a valid IPv6 address?

FEC0::AB:9007

You need to connect the end of a Cat UTP cable to a 100 punch down block. Which tool should you use?

Punchdown tool

You want to use your Windows workstation to browse the web sites on the Internet. You use a broadband DSL connection to access the Internet. Which network protocol must be installed on your workstation to do this?

IP

Which of the following is a valid MAC address?

C0-34-FF-15-01-8E

Which of the following IP addresses have a default subnet mask of 255.255.0.0 (select three)

1) 168.16.5.1

2) 129.0.0.1

3) 191.168.2.15

What device is used to create a physical star topology?

Switch

Which of the following are characteristics of coaxial network cable? (select two)

1) It uses two concentric metallic conductors

2) It has a conductor made from copper in the center of the cable

You are setting up a small network in your office with one Windows server and 50 Windows workstation. You want to spend as little time as possible configuring the workstations with IP addressing information. What should you do?

Install the DHCP service on your server

You are installing networking cable in the air space between the ceiling and the roof of a building. Which type of cabling should you use?

Plenum

Which of the following is used on a wireless network to identify the network name?

SSID

Which of the following is true when the DHCP setting is disabled in a wireless network?

Wireless clients must use a static IP address within the correct IP address range to connect to the network

Which of the following IP addresses are Class C addresses? (select three)

You’ve used your Windows workstation to map a drive to a shared folder on a Windows server. Which protocol was used to access the share?

SMB

Which network type uses light pulses to transmit data?

Fiber optic

Which of the following is the best definition for a LAN?

A network in a small geographic area, like in an office

Which of the following are security protocols for wireless networks? (select two)

1) WEP

2) WPA

What type of network describes a workgroup?

Peer-to-peer network

Which of the following correctly describe the most common format for expressing IPv6 addresses? (select two)

1) Hexadecimal numbers

2) 32 numbers, grouped using colons

Which of the following hardware devices regenerates a signal out all connected ports without examining the frame or packet contents?

Hub

Which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building?

Place access points above where most clients are

Which of the following features is supplied by WPA2 on a wireless network?

Encryption

Which of the following statements accurately describes how a modem works? (select two)

1) It demodulates analog data from a telephone network into digital PC data

2) It modulates digital data from the PC into analog data and transmits it on a telephone network

You have a small network that uses a hub to connect multiple devices. What physical topology is used?

Star

Which type of configuration would you use if you wanted to deploy 802.11n technology to communicate directly between two computers using a wireless connection?

Ad hoc

Which of the following IP addresses belong to the Class A network 114.0.0.0? (select three.) Tip: Assume the network is indicated by the default portion of the IP address

1) 114.0.0.15

2) 114.122.66.12

3) 114.58.12.0

What is the default subnet mask for the IP address 203.111.3.3?

255.255.255.0

What is a major benefit of STP over UTP?

Greater resistance to interference

You recently installed a small office home office wireless router. To avoid security holes and bugs, what should you do to the route?

Update the firmware

You are talking with a customer support technician on the telephone. The technician recommends downloading a particular driver from Internet. When you try to connect to the Internet using your modem, you can’t What is the problem?

You need to hang up

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in the situation?

802.11n

Which tool would you use in Windows Vista/7 to manage network connections?

Network and Sharing Center

You are a software developer and you are creating a multimedia streaming application. Data will be streamed from your streaming server to streaming clients over IP networks. Which transport protocol should your application use to send data between the clients and the server?

UDP

What protocol is used to send e-mail messages from a mail client to a mail server?

SMTP

A user on your network has been moved to another office down the hall. After the move she calls you complaining that she has only occasional network access through her wireless connection. Which of the following is most likely the case of the problem?

The client system has moved too far away from the access point

You want to implement name resolution on the Linux workstations in your company. Which protocol will you use to do this?

DNS

Which of the following statements about the Dynamic Host Configuration Protocol (DHCP) are true? (select two)

1) It can deliver a DNS server address in addition to the host IP address

2) A workstation must request addressing information from a DHCP server

You are troubleshooting network connections on a Windows workstation and you want to view a list of connections on the computer. How can you do this? (select two)

1) On the Start menu, click Control panel, then click Network and Internet

Which of the following are advantages of using a domain to manage a network? (select two)

1) Centralized administration

2) Scalability

Which of the following are features of Basic Rate ISDN (BRI)? (select three)

1) Dial-up connection

2) Two data channels

3) One control channel

What type of cabling could be used for an Ethernet 100BaseT (100 Mbps) network? (select two)

1) Cat 6 UTP

2) Cat 5 UTP

Which actions allow you to access the Internet on your laptop via a cellular network?

Install a cellular USB adapter in a open port on the laptop

A customer has called an indicated that he thinks his neighbor is connecting to his wireless access point (AP) to use his high-speed Internet connection. Which of the following will help resolve this issue? (select two)

1) Disable SSID broadcast on the AP

2) Implement WPA2

Which of the following topologies connects each device to a neighboring device?

Ring

Which of the following protocols do e-mail clients use to download messages from a remote mail server?

POP3

Which TCP/IP configuration parameter identifies the router that is used to reach hosts on remote networks?

Default gatway

Which of the following are good reasons to enable NAT?

To translate between Internet IP addresses and the IP addresses on your private network

Which of the following LAN devices receives a signal on one port, and the forwards that signal only to the port where the destination device is connected?

Switch

Which of the following is a valid IP address? (select two)

1) 2.2.2.2

2) 172.16.1.26

To access the Internet through the Publicly Switched Telephone Network (PSTN), what kind of connectivity device must you use?